Publishers

Check Point Endpoint Security Check Point Endpoint Security





How to uninstall Check Point Endpoint Security from your PC

Check Point Endpoint Security is a Windows program. Read more about how to uninstall it from your computer. It is written by Check Point Software Technologies Ltd.. Additional info about Check Point Software Technologies Ltd. can be seen here. Please follow if you want to read more on Check Point Endpoint Security on Check Point Software Technologies Ltd.'s web page. The program is often located in the C:\Program Files (x86)\CheckPoint\Endpoint Security directory (same installation drive as Windows). The entire uninstall command line for Check Point Endpoint Security is MsiExec.exe /X{EEBC4F73-767B-497A-95B4-651E9174A34A}. Check Point Endpoint Security's primary file takes about 1.64 MB (1717704 bytes) and its name is CheckConnectivity.exe.

The following executables are installed beside Check Point Endpoint Security. They occupy about 94.61 MB (99205056 bytes) on disk.

  • chkdat32.exe (118.63 KB)
  • disknet.exe (31.01 MB)
  • InstallDeviceFilterDriver.exe (166.69 KB)
  • KAEon.exe (317.63 KB)
  • SelectUsersSrv.exe (23.00 KB)
  • ServiceRequest.exe (40.00 KB)
  • unlock.exe (1.54 MB)
  • unlock_ntfs.exe (20.80 MB)
  • MeDrInst.exe (187.69 KB)
  • CheckConnectivity.exe (1.64 MB)
  • cpda.exe (3.93 MB)
  • cppsm_tool.exe (189.69 KB)
  • CPRegSvr.exe (90.24 KB)
  • cpvinfo.exe (71.74 KB)
  • cp_InstPrep.exe (2.31 MB)
  • dlg.exe (212.19 KB)
  • EPS_LogViewer.exe (390.74 KB)
  • EP_CDT.exe (113.74 KB)
  • fwcpp.exe (33.49 KB)
  • IDAFServerHostService.exe (651.69 KB)
  • PacketMon.exe (176.69 KB)
  • PushOperationsRepairHelper.exe (378.69 KB)
  • CRSValidator.exe (166.74 KB)
  • cpinfo.exe (518.19 KB)
  • CpInfoPreboot.exe (612.63 KB)
  • cpinfoUI.exe (221.69 KB)
  • DumpSMBios.exe (81.13 KB)
  • ListInstalledApps.exe (88.63 KB)
  • ListPartitions.exe (108.63 KB)
  • lspol.exe (48.00 KB)
  • cpinfo_uploader.exe (6.27 MB)
  • EPHealthMonitor.exe (954.69 KB)
  • tracelog.exe (83.69 KB)
  • tracelog.exe (91.19 KB)
  • nginx.exe (3.54 MB)
  • DriveSlavingUtilityCLI.exe (892.63 KB)
  • fdecontrol.exe (2.75 MB)
  • FDE_Drive_Slaving.exe (1.41 MB)
  • UseRec.exe (889.63 KB)
  • nemcontrol.exe (415.19 KB)
  • NEM_svc.exe (1.61 MB)
  • CPEPNotifier.exe (48.74 KB)
  • cptrayLogic.exe (21.19 KB)
  • cptrayUI.exe (660.19 KB)
  • logProcessor.exe (123.69 KB)
  • HotspotApplication.exe (14.69 KB)
  • wkhtmltopdf.exe (8.17 MB)
  • cptrayWUI.exe (90.69 KB)
  • EPWD.exe (498.69 KB)
  • EPWD_Tool.exe (67.69 KB)
...click to view all...

This info is about Check Point Endpoint Security version 85.20.1115 only. You can find below info on other releases of Check Point Endpoint Security:

...click to view all...
Following the uninstall process, the application leaves leftovers on the computer. Some of these are shown below.

Folders left behind when you uninstall Check Point Endpoint Security:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security

Check for and remove the following files from your disk when you uninstall Check Point Endpoint Security:
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Anti-Malware\Avsys\license\577724F1.key
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\apputils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\AuthToken.ps1
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\AuthToken.xaml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\caCert.txt
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\ccore32.bin
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CheckConnectivity.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\ckpssl.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CloudServices.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CommonClientSettings.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\COMSecurityPS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\comutils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\config.bak
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\Content.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CP.UEPM.Console.FDE.Authentication.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cp_InstPrep.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cp_policy.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CP_version_info.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpbcrypt.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpca.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpcert.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpcryptutil.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\Cpd.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpda.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpexpat.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CPLogLUUID.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CPLogRepository.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpopenssl.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpprng.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpprod50.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cppsm.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cppsm_tool.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CPRegSvr.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpsic.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpsrvis.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpvinfo.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cpxerces_c.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\cryptocore.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CZ.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\DAF_dsm.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\daf_logger.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\DafStub.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\DataStruct.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\DE.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\DeviceAgentAPI.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\dlg.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\Encode.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\EP_CDT.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\epbladeis.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\eps_logct.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\EPS_LogViewer.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\EventUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\fdt.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\FeaturesDefault.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\FR.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\fwcpp.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\idafReg.reg
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\iDAFServer.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\IDAFServerHostService.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\IItoolBox.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\ISWKL.sys
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\JPN.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\KerberosClient.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\KerberosCommon.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\libcurl.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\messaging.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\objlib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\opsec.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\OS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\PacketMon.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\ProdUtils.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\ProviderStore.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\PushOperationsClient.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\PushOperationsRepairHelper.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\Resolve.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\RUS.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\sic.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\sicauth.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\skey.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\uepmencryptionservices.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\UepmLogSchemaLib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\UepmLogXformLib.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\x64\epbladeis.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\ZDx.dll
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\crs.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\CRSValidator.exe
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.11.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.12.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.13.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.15.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.16.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.17.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.19.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.20.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.21.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.22.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.23.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.24.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.25.xml
  • C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\Conf\LogConvertorSchema.26.xml

Registry keys:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\37F4CBEEB767A794594B56E119473AA4
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{EEBC4F73-767B-497A-95B4-651E9174A34A}

Additional registry values that you should remove:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\37F4CBEEB767A794594B56E119473AA4\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files (x86)\CheckPoint\Endpoint Security\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\WINDOWS\Installer\{EEBC4F73-767B-497A-95B4-651E9174A34A}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Check Point Device Auxiliary Framework\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CPDA\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPClientUIService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EPWD\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ISWKL\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TracSrvWrapper\ImagePath


A way to delete Check Point Endpoint Security from your PC using Advanced Uninstaller PRO

Check Point Endpoint Security is a program marketed by Check Point Software Technologies Ltd.. Sometimes, users choose to remove this application. Sometimes this is efortful because performing this by hand requires some skill related to removing Windows programs manually. One of the best QUICK procedure to remove Check Point Endpoint Security is to use Advanced Uninstaller PRO. Here is how to do this:





1. If you don't have Advanced Uninstaller PRO already installed on your system, add it. This is good because Advanced Uninstaller PRO is a very efficient uninstaller and general tool to optimize your PC.

DOWNLOAD NOW

  • navigate to Download Link
  • download the program by clicking on the green DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. It's recommended to take your time to get familiar with Advanced Uninstaller PRO's interface and wealth of functions available. Advanced Uninstaller PRO is a very good program.

3. Click on the General Tools category
Go to General Tools


4. Press the Uninstall Programs feature
Go to Uninstall Programs


5. All the applications installed on your PC will appear

6. Scroll the list of applications until you find Check Point Endpoint Security or simply activate the Search feature and type in "Check Point Endpoint Security". If it is installed on your PC the Check Point Endpoint Security application will be found very quickly. When you click Check Point Endpoint Security in the list of apps, the following data regarding the application is available to you:


  • Safety rating (in the lower left corner). The star rating explains the opinion other users have regarding Check Point Endpoint Security, ranging from "Highly recommended" to "Very dangerous".
  • Reviews by other users - Click on the Read reviews button.
  • Technical information regarding the program you are about to uninstall, by clicking on the Properties button.
For example you can see that for Check Point Endpoint Security:





  • The web site of the program is: http://www.checkpoint.com
  • The uninstall string is: MsiExec.exe /X{EEBC4F73-767B-497A-95B4-651E9174A34A}
7. Press the Uninstall button. A confirmation window will come up. Confirm the removal by pressing Uninstall. Advanced Uninstaller PRO will uninstall Check Point Endpoint Security.
Uninstall Check Point Endpoint Security


8. After uninstalling Check Point Endpoint Security, Advanced Uninstaller PRO will ask you to run a cleanup. Click Next to start the cleanup. All the items of Check Point Endpoint Security that have been left behind will be found and you will be asked if you want to delete them. By uninstalling Check Point Endpoint Security with Advanced Uninstaller PRO, you can be sure that no registry entries, files or directories are left behind on your computer.

Your system will remain clean, speedy and able to run without errors or problems.



Disclaimer

The text above is not a piece of advice to uninstall Check Point Endpoint Security by Check Point Software Technologies Ltd. from your computer, we are not saying that Check Point Endpoint Security by Check Point Software Technologies Ltd. is not a good application for your computer. This text only contains detailed instructions on how to uninstall Check Point Endpoint Security in case you decide this is what you want to do. The information above contains registry and disk entries that our application Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.

2021-11-18 / Written by Dan Armano for Advanced Uninstaller PRO

follow @danarm
Last update on: 2021-11-18 01:53:32.740